Uncategorized

Uncategorized

0 1352
Install and Enable Epel repository: ## RHEL/CentOS 6 64-Bit ## # wget http://download.fedoraproject.org/pub/epel/6/x86_64/epel-release-68.noarch.rpm # rpm -ivh epel-release-6-8.noarch.rpm # yum install openvpn –y Copy sample Client configuration file under /etc/openvpn: #...

0 1265
What are TCP Wrappers? TCP Wrappers can be used to GRANT or DENY access to various services on your machine to the outside network...

0 1133
What is rootkit ? A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a cracker...

0 1025
It's not a good idea to create a root equivalent user account,We are not recommending to create such user, this post is made for...

0 1092
WHM/cPanel is most popular Linux-based website hosting control panel that provides graphical interface for hosting a website. It is a proprietary software that is...

0 1119
OpenVPN is a open-source software application that is used to implement virtual private network (VPN) techniques for secure point-to-point connections in remote access facilities. Open...

0 1181
What is MAC((Media Access Control) Address? The MAC address is a unique value associated with a network adapter. MAC addresses are also known as hardware...

0 1071
SGID BIT (Set-group identification ) SGID permission on executable file SGID permission is similar to the SUID permission, only difference is, when the script or command...

0 1034
Special Permissions (SUID,SGID and StickyBit )  In Linux The regular file and directory permissions in Linux world are read write and execute permissions on owner,...

1 975
What is Sticky Bit? Sticky Bit is mainly used on folders in order to avoid deletion of a folder and its content by other users...

Social Caring